logic instructions , Basic Computer Science

Assignment Help:
They are used to act upon logic operations on the operators.
AND
OR, NEG
NOT
TEST
XOR

AND INSTRUCTION
Function: It acts upon the conjunction of the operators bit by bit.
Syntax:
AND destiny, source
The outcome of this operation is stored on the destiny operator.
OR INSTRUCTION
Function: Logic inclusive OR
Syntax:
OR destiny, source

NEG INSTRUCTION
Function: It produces the complement to 2.
Syntax:
NEG destiny
This instruction produces the complement to 2 of the destiny operator and stores it on the similar operator.
NOT INSTRUCTION
Function: It carries out the turnaround of the destiny operator bit by bit.
Syntax: NOT destiny
The outcome is stored on the same destiny operator.

TEST INSTRUCTION
Function: It logically evaluates the operators
Function: TEST destiny, source
It executes a conjunction, bit by bit, of the operators, but differing from AND, this instruction does not place the result on the destiny operator, it only has effect on the state of the flags.
XOR INSTRUCTION
Function: OR exclusive
Syntax:
XOR destiny, source its function is to do the logic exclusive disjunction of the two operators bit by bit.

Related Discussions:- logic instructions

Expert system, Develop a simple expert system to pick ten stocks to conside...

Develop a simple expert system to pick ten stocks to consider. Create seven or more rules that could be used in such an expert system. Create five cases and use the rules

COMPUTER SYSTEM ARCHITECTURE, PLEASE HELP ME TO CONSTRUCT THE XOR GATE USIN...

PLEASE HELP ME TO CONSTRUCT THE XOR GATE USING ONLY NAND GATE

Twisted pairs, Twisted Pairs: Twisted pairs are familiar to all of us ...

Twisted Pairs: Twisted pairs are familiar to all of us as the copper wire telephone lines. These are of low frequency, and support a limited bandwidth (one voice channel) but

Multiplaxer, what is multiplaxer and truth table, digram

what is multiplaxer and truth table, digram

Computer storage, Computer Storage: Computer systems include two types...

Computer Storage: Computer systems include two types of digital information storage: internal storage, within the CPU, and the backing (back up) storage on external devices su

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Examples of online databases, Examples of Online Databases: The adopti...

Examples of Online Databases: The adoption of modern technology has resulted in the proliferation of machine readable databases. The National Library of Medicine (USA) designe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd